subject
Computers and Technology, 27.05.2020 21:04 chops85

The computers on two networks need to securely communicate and they use two gateways. Each gateway stores its private and public keys as well as the public key of the other gateway. They encrypt the message on one gateway and decrypted on the other. The computers on each network do not store these keys, but they use the keys that they have stored, as in part A, to encrypt their messages before sending them to the gateways. a) Sketch how does the message look like when it leaves the computer and when it leaves the gateway. What information can be encrypted and what information should be available in unencrypted format. Why? Note: The message has a payload and a header (m = hp). The header contains sender’s and receiver’s address, while the payload contains data. Use SC for sending computer, RC for receiving computer, SG for sending gateway, RG for receiving gateway, KPu for public key, KPr for private key. For example, KPuSCN1 is the public key for sending computer on network 1. Also, {m}KPuSCN2 is message encrypted with public key of sending computer on network 2. b) Would this protocol decrease the number of public and private keys needed in part A? Explain. Show how many keys are needed to be stored per computer.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 12:10
Linux is distributed under gnu gpl. why is this important? a. it ensures that only torvalds can profit from the sale of linux b. it prevents unknowledgeable users from downloading programs they don't know how to operate. c. it provides protection for the developers who created linux. d. it states that anyone can copy, modify, and share the program if changes are made public.
Answers: 1
question
Computers and Technology, 22.06.2019 16:20
Consider the following statements, then select one of the answers below: the signal() function shown below registers "sig_handler()" as the signal handler function for the sigkill signal, without the complexity of using when the sigkill signal is sent to a process running this code, by a user typing "kill -kill ", where the correct process id is used for to target the process, sig_handler() will be executed.
Answers: 1
question
Computers and Technology, 23.06.2019 12:30
What is the difference between the internet and the world wide web?
Answers: 1
question
Computers and Technology, 23.06.2019 13:00
Which one of the following voltages should never be measured directly with a vom? a. 1200 v b. 500 v c. 800 v d. 100v
Answers: 2
You know the right answer?
The computers on two networks need to securely communicate and they use two gateways. Each gateway s...
Questions
question
Mathematics, 02.12.2020 17:50
question
History, 02.12.2020 17:50
question
Mathematics, 02.12.2020 17:50
Questions on the website: 13722362